買這商品的人也買了...
-
Introduction to Data Compression, 2/e$1,050$1,029 -
Data Mining: Concepts and Techniques$2,470$2,347 -
Software Engineering: A Practitioner's Approach, 5/e$980$960 -
SQL Server 2000 資料庫設計與系統管理$650$514 -
Introduction to Algorithms, 2/e (Hardcover)$990$970 -
LPI Linux 資格檢定 (LPI Linux Certification in a Nutshell)$880$695 -
Operating System Concepts, 6/e (Windows XP Update)$1,050$1,029 -
Cryptography and Network Security Principles and Practices, 3/e$1,030$1,009 -
JavaScript 範例活用辭典$450$351 -
Web 好色-網頁色彩學$420$328 -
PHP & MySQL 完全架站攻略第二版$620$527 -
Java 完美經典優質學習篇$750$638 -
Red Hat Linux 9 實務應用$650$553 -
Linux 核心程式設計 (Linux Kernel Programming, 3/e)$580$458 -
802.11 無線網路技術通論 (802.11 Wireless Networks: The Definitive Guide)$760$600 -
Dreamweaver MX 互動網站百寶箱 for ASP$580$493 -
ASP.NET 程式設計徹底研究$590$466 -
Borland 傳奇$280$221 -
Red Hat Linux 9 架站實務$620$527 -
STRUTS 實作手冊(Struts in Action: Building Web Applications with the Leading Java Framework)$690$538 -
Windows Server 2003 系統建置篇$590$466 -
鳥哥的 Linux 私房菜-伺服器架設篇$750$638 -
鳥哥的 Linux 私房菜─基礎學習篇增訂版$560$476 -
osCommerce 購物網站架設實戰$550$468 -
Linux 驅動程式 (Linux Device Drivers, 2/e)$880$695
相關主題
商品描述
* Shows step-by-step how to complete a customized security improvement plan,
including analyzing needs, justifying budgets, and selecting technology, while
dramatically reducing time and cost
* Includes worksheets at every stage for
creating a comprehensive security plan meaningful to management and technical
staff
* Uses practical risk management techniques to intelligently assess and
manage the network security risks facing your organization
* Presents the
material in a witty and lively style, backed up by solid business planning
methods
* Companion Web site provides all worksheets and the security
planning template
Table of Contents
Introduction.
Chapter 1. Setting the Stage for Successful Security Planning.
Chapter 2. A Security Plan That Works.
Chapter 3. Using the Security Plan Worksheets: The Fundamentals.
Chapter 4. Using the Security Plan Worksheets: The Remaining Core and Wrap-up Elements.
Chapter 5. Strategic Security Planning with PKI.
Chapter 6. Ahead of the Hacker: Best Practices and a View of the Future.
For Further Reading.
Glossary.
Index.
